All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
fraud examination
Questions and Answers of
Fraud Examination
Which of the following best describes the relationship between an employee’s position and theft (according to Hollinger and Clark’s research)?1.The more expensive thefts are observed in jobs with
In terms of the definition of occupational fraud and abuse, who is an employee?1. Any person who receives regular and periodic compensation from an organization for his or her labor 2. Only rank and
The difference between fraud and errors is:1.The materiality of the value involved 2. Intent of those involved 3. Whether it affects owners’ equity or not 4. All of the choices are correct
One of the most important contributions of criminology to the study of fraud is:1. The M.I.C.E. concept 2. The fraud triangle 3. The relationship of punishment to remediation 4. None of the above
Financial statement fraud is often attributed to pressures.These pressures include all of the following except:1. Investment losses by managers 2. Meeting analysts’ expectations 3. Deadlines and
Which two adjustments are made to the fraud triangle to accommodate predators?1. The fraud triangle is not meant to differentiate between accidental and predator raudsters.2. Criminal mindset and
One major difference between fraud and a mistake is:1. Concealment 2. Cover-up 3. The act 4. Conversion (benefit to the perpetrator)
One way of demonstrating that an act was fraud and not a mistake is by:1. Demonstrating that the employee concealed the act 2. Showing that there were multiple incidents of the same act 3. The
Large fraud perpetrators are more likely to use the money for all of the following except:1. To purchase new homes 2. To pay for expensive vacations 3. To support extramarital affairs 4. To pay
Which WorldCom employee initially confessed to the fraud and what was his position?
Was there ever a concern over the discovery of the investigation and possible destruction of evidence?
Did complicated computer programming and analysis play a role in the investigation?
This is an unusual paragraph. I’m curious how quickly you can find out what is so unusual about it. It looks so plain you would think nothing was wrong with it. In fact, nothing grammatical is
Which of the following statements is not true concerning the civil and criminal justice systems?1. In the criminal system, a convicted person must be sentenced to jail or probation.2. In both the
Which of the following is most accurate with regard to Miranda Warnings?1. A Miranda Warning is only required if the person arrested asks for it.2. A Miranda Warning is considered a privilege in the
Which statement regarding surveillance is least accurate?1. Warrants apply to law enforcement only.2. Audio capture is permitted in circumstances where video surveillance in also collected.3. Once
Of the following approaches, which is not used by investigators to obtain documents?1. Voluntary consent 2. Search warrant 3. Jury ruling 4. Subpoena
Of the following list of evidence, which is considered demonstrative?1. PowerPoint slides 2. Fingerprints 3. Official documents 4. Testimony by a law enforcement officer with extensive use of hand
Select the item that most accurately reflects the difference between probation and parole?1. There are no differences; probation and parole are the same thing.2. Parole is a form of limited
Which of the following is usually not a factor that affects the decision to prosecute an entity (organization)?1. The number of individuals complicit in the illegal act 2. Remedial action(s) taken by
Which of the following statements is true with regard to accounting?1. Assets are resources under the entity’s control that have future value.2. Liabilities are obligations to suppliers, other
Which of the following did not result from Sarbanes–Oxley Act of 2002?1. Management’s assessment of internal controls 2. Prohibitions on personal loans to executives 3. Certification obligations
Individual rights associated with criminal law are grounded in the following four amendments to the U.S. Constitution:1. First, Fourth, Fifth, and Ninth 2. Fourth, Fifth, Sixth, and Ninth 3. Fourth,
What was Enron’s first successful market?
What created to opportunity for Enron to trade in this market?
What was the name of Enron’s fair value accounting model?
What related party legal entity did Enron make famous?
Who was the famous whistleblower who penned the memo “Has Enron Become a Risky Place to Work?”
Was Enron an accounting fraud or a business failure concealed by fraud?
Enron extensively used fair value accounting. What prevents companies from abusing fair value accounting the way that Enron did?
Did Enron’s auditor fail or was the auditing firm a victim as well?
A scientist has two buckets—one holds 4 gallons and the other holds 5 gallons—as well as an unlimited water supply.By using nothing but the buckets and water, how can you accurately measure 3
Three people check into a hotel. They pay $30 to the manager and go to their room. The manager suddenly remembers that the room rate is $25 and gives $5 to the bellboy to return to the people. On the
Identify from Cressey’s research the six situational categories that cause nonshareable problems.
Select the statement that best describes organizational versus organized crime:1. Organizational and organized crime are essentially the same—both center on crimes committed by organizations.2.
Which of the following is true with regard to Cressey’s theory of crime causation? 1. For a fraud to occur, only one of the fraud triangle attributes (perceived pressure, perceived opportunity, or
Identify which of the following is not considered a nonshareable problem from Cressey’s research.1 .Business reversal such as bankruptcy 2.Losses due to gambling 3. Justification of the fraud act
What was Cynthia Cooper’s position at WorldCom?
Approximately how much value was lost as a result of the WorldCom collapse?
From an ethical perspective, did Cynthia Cooper have to report this fraud? Why or why not?
What ethical issues, conflicts of interest, and noncompliance with corporate policies and procedures might Cynthia Cooper have faced in the context of her investigation?
What alternative courses of action, if any, might you have suggested for Cynthia Cooper and her colleagues given the framework of appropriate ethical conduct?
Assume that the following facts and circumstances are grounded in evidence:1. A retired couple has a lifetime of community involvement and service.2. Evidence supports the retired couple becoming
Assume that the following facts and circumstances are grounded in evidence:1. An information technology employee has control over aspects of business operations of a small business, including
Do any accounting or payroll personnel or related parties appear on the contractor payroll?
The forensic accounting analysis determined that two accounting personnel were identified as inappropriately receiving disbursements through the contract attorney payroll.Administrative personnel
The Fourth Amendment requires that probable cause exist before a defendant is arrested or searched. Which of the following levels of evidence is necessary to show probable cause?a. Less than
Which of the following actions can fraud victims pursue after sufficient evidence is obtained?a. Prosecute in a criminal court.b. Pursue civil litigation.c. Take no action at all.d. Two of the above.
In a civil trial, settlements may be negotiated:a. At any time during the litigation.b. After arraignment.c. At no time once negotiation begins.d. Only after the judge orders negotiation between
Which of the following is not one of the common stages of a criminal case?a. Filing a criminal charge.b. Filing a complaint.c. Discovery.d. Trial and appeal.
Having a civil trial before a criminal trial has which of the following benefits?a. Defendant may make admissions during civil trial that can be used in criminal trial.b. Greater access to documents
When deposing an expert witness, the opposing attorneys try to achieve all of the following goals except:a. Understanding the expert’s opinion.b. Understanding the expert’s credentials.c. Seeking
Fraud investigators can assist in a case in which of the following ways?a. By preparing questions to ask opposing witnesses during depositions.b. By evaluating whether documents produced by the
During cross-examination, expert witnesses should:a. Address areas outside of their areas of expertise.b. Appreciate opposing council when they act very friendly.c. Respond evasively and ambiguously
During a trial or deposition, expert witnesses should:a. Respond aggressively.b. Bring notes and work papers to cite.c. Answer questions convincingly, without hedging their answers.d. Memorize
Which of the following rights is not provided by the Fifth Amendment?a. Individuals are protected from double jeopardy (being tried twice for the same crime).b. States cannot seize private property
What is/are the distinguishing factor(s) between the lower and higher state trial courts?a. Amount of monetary damage.b. Seriousness of the crime.c. Availability of the court.d. Both a and b.e. All
Most court cases are decided in state courts, except when:a. Federal laws are in question.b. The case involves several states.c. The amount exceeds $100,000.d. Both a and b are correct.
To be convicted in a criminal case, the standard of evidence is:a. Beyond a shadow of a doubt.b. Beyond a reasonable doubt.c. Preponderance of evidence.d. All of the above.
A deposition is a testimony taken before the trial begins in a situation that is usually less formal than a courtroom, but in which the court rules and regulations still apply. (True/False)
An individual committing fraud can be prosecuted either criminally or civilly, but not both. (True/False)
The defendant can choose to have his or her case tried in either a state lower court or a state higher court. (True/False)
The federal courts will only hear cases that involve federal law, more than one state, or a federal statute. (True/False)
If responses to interrogatories are not given in a timely fashion, the court may charge fees and costs to a noncomplying party and issue an order demanding that all questions be answered. (True/False)
The parties in a civil case may negotiate a settlement during any stage of litigation. (True/False)
A request for confession asks the opposing party to admit designated facts relevant to litigation. (True/False)
An interrogatory is a series of written questions that specifically identifies information needed from the opposing party. (True/False)
An initial pleading or complaint generally includes an explanation of the alleged violation and the monetary expenses or damages sought. (True/False)
Investigation is the legal process by which each party’s attorneys try to find all information about the other side’s case before the trial begins. (True/False)
To be successful, the plaintiff in a civil case must prove his or her case beyond a reasonable doubt. (True/False)
The burden of proof necessary to prove a defendant is guilty in a criminal trial is significantly greater than that in a civil trial. (True/False)
If, during a preliminary hearing, sufficient evidence is not available to show probable cause, the defendant can still be prosecuted at a later time when more evidence is available.(True/False)
The prosecution usually prefers to present evidence at a grand jury because the accused does not have the right to hear the evidence. (True/False)
Civil cases must consist of a jury of at least six jurors. (True/False)
State courts hear bankruptcy cases. (True/False)
Most fraud cases are tried in federal courts. (True/False)
Secure Web connections are based in:a. DNS.b. FTP.c. HTTPS.d. FTPS.
What is the most important factor in control effectiveness?a. Clear policies regarding controls.b. An understanding of e-business networks.c. The use of random monitoring.d. The “tone at the top.”
Which of the following types of controls is least often used to protect IT processing equipment?a. Physical controls.b. Authorization controls.c. Independent checks or reference.d. Documents and
Which of the following human features is generally not used in biometrics?a. Fingerprints.b. Voice tones.c. Retina patterns.d. Weight.
Passwords and biometrics are both:a. Authorization controls.b. Independent check controls.c. Physical controls.d. Document controls.
Using a subtly different Internet host name to mimic another business is known as:a. Spoofing.b. Sniffing.c. Web-visit hijacking.d. Falsified identity.
Which of the following fraud risks involves viewing information as it passes along network channels?a. Sniffing.b. Spoofing.c. False Web sites.d. Web hijacking.
Which of the following fraud risks involves changing IP addresses?a. Spoofing.b. Sniffing.c. False Web sites.d. Customer impersonation.
Which of the following is not an internal control activity or procedure?a. Physical safeguards.b. Segregation of duties.c. Internal auditors.d. Documents and records.
Which of the following is not an element of a company’s control environment?a. Audit committee participation.b. Management’s philosophy.c. Hiring policies.d. Independent checks.
E-business transactions make it easier to commit which of the following types of frauds?a. Kickbacks.b. Customer impersonation.c. Setting up dummy companies.d. Stealing petty cash.
Which of the following is not a fraud risk unique to e-business transactions?a. Innovative technologies where security lags process development.b. Selling new products.c. Complex information
Using secret measures as the basis for a security system is generally seen as less effective than using public, time-tested procedures. (True/False)
Intrusion detection is the activity of trying to break into competitors’ computer networks. (True/False)
It is often easier to analyze e-business transaction data than data from other types of transactions because information is captured in databases that can be manipulated. (True/False)
Biometrics is a form of authorization control. (True/False)
Digital signatures use human features to create secure access controls. (True/False)
Segregation of duties is an important control in preventing e-business fraud. (True/False)
Customer impersonation is similar to a bust-out fraud. (True/False)
In many e-business sales, password protection is the only barrier to unauthorized access. (True/False)
Falsified identity and customer impersonation are the same thing. (True/False)
Sniffing changes e-mail headers or IP addresses. (True/False)
Data theft is a bigger problem in e-business transactions than money theft. (True/False)
Fraud risks are higher when the entity with whom you are transacting business can’t be seen. (True/False)
Showing 400 - 500
of 1148
1
2
3
4
5
6
7
8
9
10
11
12